{"id":150,"date":"2021-09-29T19:11:57","date_gmt":"2021-09-29T19:11:57","guid":{"rendered":"https:\/\/gallant-keller.195-20-240-105.plesk.page\/index.php\/mesmerize\/"},"modified":"2024-06-15T15:18:25","modified_gmt":"2024-06-15T14:18:25","slug":"mesmerize","status":"publish","type":"page","link":"https:\/\/bay-sec.de\/dach\/","title":{"rendered":"BaySec &#8211; Bayerische Gesellschaft f\u00fcr Cybersicherheit"},"content":{"rendered":"<div  data-label=\"Overlappable\" data-id=\"overlappable--7\" data-export-id=\"overlappable-1\" data-category=\"overlappable\" class=\"overlappable-1 content-section content-section-spacing\" data-overlap=\"true\" id=\"overlappable-5\" style=\"background-color: rgb(255, 255, 255);\" data-section-ov=\"1\"><div  class=\"gridContainer\"> <div  data-type=\"row\" class=\"row shadow-medium\"> <div  data-type=\"column\" class=\"col-xs-12 col-sm-4 flexcol col-padding col-padding-small-xs inverted bg-color14\"><h4  class=\"\"><span  style=\"color: rgb(30, 115, 190); font-weight: 700;\">Informationssicherheit<\/span><span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\"><span  style=\"color: rgb(30, 115, 190); font-weight: 700;\">\ufeff<\/span><\/span><\/h4>   <p  class=\"\"><span  style=\"color: rgb(30, 115, 190);\">Wirtschaftlich und zuverl\u00e4ssig. \n<br ><span  style=\"font-family: arial, helvetica, sans-serif; font-style: italic;\"><span  style=\"font-weight: 700;\">\n<br >Neueste Referenz<\/span>: Das Watzmann-Spiel f\u00fcr den Landkreis Traunstein: <a data-mce-href=\"referenzen\/vorstellung-cyber-spiel-fuer-landkreis-traunstein\/\" href=\"https:\/\/bay-sec.de\/dach\/referenzen\/vorstellung-cyber-spiel-fuer-landkreis-traunstein\" target=\"_self\" data-mce-selected=\"inline-boundary\" data-cp-link=\"1\" rel=\"noopener\">Mehr erfahren.<\/a><\/span><\/span><\/p><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm-4 flexcol col-padding col-padding-small-xs inverted bg-color14\">   <p  class=\"\"><span  style=\"font-weight: 400; color: rgb(30, 115, 190);\">\u25a0&nbsp;Beratung\n<br >\u25a0 Sicherheitspr\u00fcfung &amp; Pentest<\/span><br ><span  style=\"color: rgb(30, 115, 190);\">\u25a0 Training und Awareness<\/span><br ><span  style=\"color: rgb(30, 115, 190);\">\n\u25a0 IT-Sicherheit in der Produktion<\/span><br ><span  style=\"color: rgb(30, 115, 190);\">\n\u25a0 eMail Phishing<\/span><br ><span  style=\"color: rgb(30, 115, 190);\">\u25a0 Sichere Software\n<\/span><br ><span  style=\"color: rgb(30, 115, 190);\">\u25a0 Sichere Produktionsanlagen<\/span><\/p><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm-4 flexcol col-padding col-padding-small-xs inverted bg-color14\">   <p  class=\"\"><span  style=\"color: rgb(30, 115, 190);\">\u25a0 ISMS Aufbau und Beratung<br >\u25a0 ISO 27001:2022&nbsp;<br >\n\u25a0 KRITIS-Pr\u00fcfung nach BSIG \u00a78a<br >\n\u25a0 IT-Grundschutz nach BSI 200-x<br >\n\u25a0 NIS2, UK PSTI, EU CRA, EU Data Act<\/span><\/p><\/div><\/div><\/div> <\/div><div  data-label=\"Overlappable\" data-id=\"overlappable--8\" data-export-id=\"overlappable-1\" data-category=\"overlappable\" class=\"overlappable-1 content-section content-section-spacing\" data-overlap=\"true\" id=\"overlappable-6\" style=\"background-color: rgb(255, 255, 255);\" data-section-ov=\"1\"><div  class=\"gridContainer\"> <div  data-type=\"row\" class=\"row shadow-medium\"><div  data-type=\"column\" class=\"col-xs-12 col-sm-4 flexcol col-padding col-padding-small-xs bg-color14 col-md-4\">   <h4  class=\"\"><span  style=\"color: rgb(30, 115, 190);\">Datenschutz<\/span><\/h4><p  class=\"\"><span  style=\"color: rgb(30, 115, 190);\">Mit der DSGVO und dem BDSG gilt eine Beweislastumkehr. Weisen Sie ein ordentliches Datenschutzmanagement-System (DSMS) nach.<\/span><\/p> <\/div>   <div  data-type=\"column\" class=\"col-xs-12 col-sm-4 flexcol col-padding col-padding-small-xs bg-color14 col-md-4\">   <p  class=\"\"><span  style=\"color: rgb(30, 115, 190);\">\u25a0 Datenschutzbeauftragter\n<\/span><br ><span  style=\"color: rgb(30, 115, 190);\">\u25a0 Datenschutz Audits<\/span><\/p> <\/div><div  data-type=\"column\" class=\"col-xs-12 col-sm-4 flexcol col-padding col-padding-small-xs bg-color14 col-md-4\"><p  class=\"lead\">&nbsp;<\/p>    <\/div><\/div><\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Informationssicherheit\ufeff Wirtschaftlich und zuverl\u00e4ssig. Neueste Referenz: Das Watzmann-Spiel f\u00fcr den Landkreis Traunstein: Mehr erfahren. \u25a0&nbsp;Beratung \u25a0 Sicherheitspr\u00fcfung &amp; Pentest\u25a0 Training und Awareness \u25a0 IT-Sicherheit in der Produktion \u25a0 eMail Phishing\u25a0 Sichere Software \u25a0 Sichere Produktionsanlagen \u25a0 ISMS Aufbau und Beratung\u25a0 ISO 27001:2022&nbsp; \u25a0 KRITIS-Pr\u00fcfung nach BSIG \u00a78a \u25a0 IT-Grundschutz nach BSI 200-x \u25a0 NIS2, UK&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/bay-sec.de\/dach\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/homepage.php","meta":{"footnotes":""},"class_list":["post-150","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bay-sec.de\/dach\/wp-json\/wp\/v2\/pages\/150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bay-sec.de\/dach\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bay-sec.de\/dach\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bay-sec.de\/dach\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bay-sec.de\/dach\/wp-json\/wp\/v2\/comments?post=150"}],"version-history":[{"count":101,"href":"https:\/\/bay-sec.de\/dach\/wp-json\/wp\/v2\/pages\/150\/revisions"}],"predecessor-version":[{"id":7557,"href":"https:\/\/bay-sec.de\/dach\/wp-json\/wp\/v2\/pages\/150\/revisions\/7557"}],"wp:attachment":[{"href":"https:\/\/bay-sec.de\/dach\/wp-json\/wp\/v2\/media?parent=150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}